CVE-2024-4741
- EPSS 0.24%
- Veröffentlicht 13.11.2024 11:15:04
- Zuletzt bearbeitet 04.11.2025 18:16:42
Issue summary: Calling the OpenSSL API function SSL_free_buffers may cause memory to be accessed that was previously freed in some situations Impact summary: A use after free can have a range of potential consequences such as the corruption of valid...
CVE-2024-9143
- EPSS 0.66%
- Veröffentlicht 16.10.2024 17:15:18
- Zuletzt bearbeitet 03.11.2025 23:17:33
Issue summary: Use of the low-level GF(2^m) elliptic curve APIs with untrusted explicit values for the field polynomial can lead to out-of-bounds memory reads or writes. Impact summary: Out of bound memory writes can lead to an application crash or ...
CVE-2024-6119
- EPSS 5.69%
- Veröffentlicht 03.09.2024 16:15:07
- Zuletzt bearbeitet 03.06.2025 10:51:54
Issue summary: Applications performing certificate name checks (e.g., TLS clients checking server certificates) may attempt to read an invalid memory address resulting in abnormal termination of the application process. Impact summary: Abnormal term...
CVE-2024-5535
- EPSS 4.49%
- Veröffentlicht 27.06.2024 11:15:24
- Zuletzt bearbeitet 03.11.2025 23:17:30
Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory contents to be sent to the peer. Impact summary: A buffer overread can have a range of potential conseq...
CVE-2024-4603
- EPSS 0.08%
- Veröffentlicht 16.05.2024 16:15:10
- Zuletzt bearbeitet 21.11.2024 09:43:11
Issue summary: Checking excessively long DSA keys or parameters may be very slow. Impact summary: Applications that use the functions EVP_PKEY_param_check() or EVP_PKEY_public_check() to check a DSA public key or DSA parameters may experience long d...
CVE-2024-26306
- EPSS 0.65%
- Veröffentlicht 14.05.2024 15:08:51
- Zuletzt bearbeitet 03.11.2025 21:16:07
iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires...
CVE-2023-6237
- EPSS 0.52%
- Veröffentlicht 25.04.2024 07:15:45
- Zuletzt bearbeitet 21.11.2024 08:43:25
Issue summary: Checking excessively long invalid RSA public keys may take a long time. Impact summary: Applications that use the function EVP_PKEY_public_check() to check RSA public keys may experience long delays. Where the key that is being checke...
CVE-2024-2511
- EPSS 3.67%
- Veröffentlicht 08.04.2024 14:15:07
- Zuletzt bearbeitet 03.11.2025 22:16:50
Issue summary: Some non-default TLS server configurations can cause unbounded memory growth when processing TLSv1.3 sessions Impact summary: An attacker may exploit certain server configurations to trigger unbounded memory growth that would lead to ...
CVE-2024-0727
- EPSS 0.19%
- Veröffentlicht 26.01.2024 09:15:07
- Zuletzt bearbeitet 03.11.2025 22:16:34
Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL to crash leading to a potential Denial of Service attack Impact summary: Applications loading files in the PKCS12 format from untrusted sources might terminate abruptly. ...
CVE-2023-6129
- EPSS 2.31%
- Veröffentlicht 09.01.2024 17:15:12
- Zuletzt bearbeitet 20.06.2025 16:15:27
Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications running on PowerPC CPU based platforms if the CPU provides vector instructions. Impact summary: If an a...